Aggregator
CVE-2025-9461 | diyhi bbs up to 6.8 File Compression FilePackageManageAction.java idGroup information disclosure
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them
As students return to campus and online learning platforms, cybercriminals are increasingly leveraging artificial intelligence to create sophisticated scams targeting the education sector. These AI-enhanced attacks have become more convincing and harder to detect, making them particularly dangerous for students, parents, and educational institutions. The integration of machine learning algorithms, natural language processing, and deepfake […]
The post 5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them appeared first on Cyber Security News.
CVE-2024-39923 | Mahara up to 23.04.6/24.04.1 Footer Links About/Contact/Help cross site scripting
CVE-2025-52461 | Biosig libbiosig 3.9.0 Nex Parser out-of-bounds (TALOS-2025-2238)
CVE-2025-54480 | Biosig libbiosig 3.9.0 MFER Parser biosig.c stack-based overflow (TALOS-2025-2234 / EUVD-2025-25683)
Defensie opent poort van kazerne Assen voor civiel gebruik
CVE-2025-54462 | Biosig libbiosig 3.9.0 Nex Parser heap-based overflow (TALOS-2025-2239)
CVE-2025-53853 | Biosig libbiosig 3.9.0 ISHNE Parser heap-based overflow (TALOS-2025-2232 / EUVD-2025-25667)
CVE-2025-53557 | Biosig libbiosig 3.9.0 MFER Parser heap-based overflow (TALOS-2025-2235)
CVE-2025-53511 | Biosig libbiosig 3.9.0 MFER Parser heap-based overflow (TALOS-2025-2237)
CVE-2025-52581 | Biosig libbiosig 3.9.0 GDF Parser integer overflow (TALOS-2025-2233 / EUVD-2025-25668)
CVE-2025-53518 | Biosig libbiosig 3.9.0 ABF Parser integer overflow (TALOS-2025-2231 / EUVD-2025-25666)
CVE-2025-48005 | Biosig libbiosig 3.9.0 RHS2000 Parser heap-based overflow (TALOS-2025-2240)
Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware
A novel adaptation of the ClickFix social engineering technique has been identified, leveraging invisible prompt injection to weaponize AI summarization systems in email clients, browser extensions, and productivity platforms. By embedding malicious step-by-step instructions within hidden HTML elements—using CSS obfuscation methods such as zero-width characters, white-on-white text, tiny font sizes, and off-screen positioning—attackers can poison […]
The post Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware appeared first on Cyber Security News.
Submit #634295: diyhi bbs 6.8 Sensitive information leakage vulnerability [Accepted]
CVE-2025-9193 | TOTVS Portal Meu RH up to 12.1.17 Password Reset redirectUrl
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets
A critical security vulnerability has been discovered in Zendesk’s Android SDK implementation that allows attackers to perform mass account takeovers without any user interaction. The flaw, which earned a $3,000 bug bounty payout, stems from predictable token generation mechanisms that enable unauthorized access to all Zendesk support tickets across affected organizations. Key Takeaways1. Predictable JWT […]
The post 0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets appeared first on Cyber Security News.